VPN Client 3.0 trough NAT

Hi, already configure my pix for vpn and its working but only when I connect trough a ISP that assign IP public addressing (Im using VPN Client 3.0 for clients and terminating the VPN in a PIX ) if I use a ISP that assign private addressing the VPN its not established unless I assign a Static Translation to the Client (in the case of ISP support Static translations) this its not possible in most of cases for remote users that are traveling, My question is if its possible to establish a IPSec Tunnel over IP private addressing without using statics to establish the VPN or if its possible to use other method available supported by Cisco VPN Client 3.0 that works with NAT or PAT, the idea of use VPN Client it because it the only application that run on MAC OS X and my customer require this support.

Re: VPN Client 3.0 trough NAT

Hi Roberto

I try my inside network with PIX PAT to connect with Cisco Concentrator 3005 in same location, I can make vpn connection, phase II is fine, but I cannot make any network connection, like no NAT or PAT. What do you think my problem?

Re: VPN Client 3.0 trough NAT

Hi guys,

hope i'm not too late for this topic, I'm having the same issue here.

VPN client 3.5.1 outside and tunnel to PIX 506, right now the client is using a global address, but if i put it inside our network behind a firewall with NAT and with an static private address, i can't create the tunnel at all. beside static mapping on the firewall, what other options do i have. are there any configuration that i could get around this issue?

Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
view more

We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...
view more